Identification of false data injection attacks with considering the impact of wind generation and topology reconfigurations
M Mohammadpourfard, A Sami… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Robust control of the power grid relies on accurate state estimation. Recent studies show
that state estimators are vulnerable to false data injection attacks that can pass the bad data
detection mechanisms. A grand restriction of the existing countermeasures is dealing with
integration of renewable energy sources and topology changes because they are designed
for a specific system configuration. In this paper, to detect cyber-attacks in power systems
that are affected by sustainable energy sources or system reconfigurations, a unsupervised …
that state estimators are vulnerable to false data injection attacks that can pass the bad data
detection mechanisms. A grand restriction of the existing countermeasures is dealing with
integration of renewable energy sources and topology changes because they are designed
for a specific system configuration. In this paper, to detect cyber-attacks in power systems
that are affected by sustainable energy sources or system reconfigurations, a unsupervised …
[PDF][PDF] Identification of False Data Injection Attacks with Considering the Impact of Wind Generation and Topology Reconfigurations
Y Weng - researchgate.net
Robust control of the power grid relies on accurate state estimation. Recent studies show
that state estimators are vulnerable to false data injection attacks which can pass the bad
data detection mechanisms. A grand restriction of the existing countermeasures is dealing
with integration of renewable energy sources and topology changes because they are
designed for a specific system configuration. In this paper, to detect cyberattacks in power
systems that are affected by sustainable energy sources or system reconfigurations, an …
that state estimators are vulnerable to false data injection attacks which can pass the bad
data detection mechanisms. A grand restriction of the existing countermeasures is dealing
with integration of renewable energy sources and topology changes because they are
designed for a specific system configuration. In this paper, to detect cyberattacks in power
systems that are affected by sustainable energy sources or system reconfigurations, an …
以上显示的是最相近的搜索结果。 查看全部搜索结果